FDA Cybersecurity Remediation

Don’t Let Cybersecurity Slow Down Your FDA Submission

Do you have an upcoming 510(k), IDE, De Novo, or PMA and have inadequate cybersecurity documentation?

Did you submit already, and received major cybersecurity deficiencies in a hold letter?

We help medical device manufacturers secure their devices and rapidly get their FDA Cybersecurity Documentation in order.

We’ve Helped Others Like You

Our cybersecurity process has been used successfully in 12+ FDA submissions since the 2023 FDA Cybersecurity Guidance was finalized, and has been progressively refined with each subsequent submission. Our past experiences have helped us understand FDA’s expectations.

We really enjoyed working with Innolitics in reviewing our cybersecurity related documentation and compiling a response to the FDA. We were particularly impressed with their knowledge and expertise in the field, and quick turn-around times to our queries. We look forward to working with Innolitics on future projects.
Andrei Migatchev

Andrei Migatchev

CTO and Co-Founder at Envisionit Deep AI

With updated cybersecurity requirements rolled out during our recent FDA submission, we found ourselves looking for an experienced partner to help us navigate this new environment. We reached out to Innolitics, and they were able to quickly assess our device, develop a strategy, and meet with FDA to find a path forward. Their strategic involvement guided us toward an approach that satisfied the FDA and saved us significant upfront and on-going effort. Innolitics’ combination of software and FDA regulatory expertise was invaluable.
Eric Runde

Eric Runde

COO at Indica Labs

Our FDA submission deadline was just two weeks away, and we had no software or cybersecurity documentation. We feared we would miss the deadline. Then our regulatory team introduced us to Innolitics. Their team swiftly validated our software and prepared the 15 necessary software and cybersecurity documents. They took a pragmatic approach that truly added value. This rapid timeline would have been impossible to meet without a team deeply knowledgeable in software, cybersecurity, AI/ML, and FDA regulations. In the end, we were able to submit on time! Thank you, Innolitics, for your Herculean efforts!
Andrea Cubitt

Andrea Cubitt

CEO of Dionysus Digital Health

It’s not so bad

Your engineers may have tried working through the FDA guidance and have been overwhelmed. It is a lot to learn.

We’ve been through this before and can show you the way.

We can help push back

If you’ve submitted to FDA and they’ve identified deficiencies that seem excessive, you may be able to push back!

The ideal time to do this is during the FDA meeting within 10 days of receiving the hold letter.

We can usually begin immediately and can quickly put together a strategy.

Engagement Models

We can work with you in these ways:

Name Situation Pricing Model
AINN Response FDA flagged deficiencies in your submission and you need help responding promptly! Billed hourly at $400/hour
Guided You’ve finished most of your cybersecurity documents and you need an expert review. Billed hourly
Full Service You have an upcoming submission and need a someone to handle all your FDA cybersecurity needs for you. Fixed price with milestones:
- 20% up-front
- 20% phase 1
- 20% phase 2
- 20% phase 3
- 20% upon no FDA cybersecurity deficiencies

Our Full-Service Process

The overall process works as follows:

  1. Gap Analysis and Fixed-Price Quote
  2. Sign Statement of Work
  3. Phase 1 - Planning and Initial Security Assessment
  4. Phase 2 - Full Risk Assessment
  5. Phase 3 - Testing & Final Reports
  6. Submit to FDA
  7. Address FDA’s request for additional information (no additional cost)
  8. FDA Approval 🎉
  9. Postmarket Cybersecurity Support (optional)

Quality Guarantee

We have extensive experience helping companies with FDA submissions. If FDA finds any cybersecurity issues we missed, we'll fix them at no extra cost to you.

FAQ

What are the deliverables from your full-service solution?

The following documents cover FDA cybersecurity requirements for 510(k), De Novo, and PMA submissions. The documents are organized so they can be uploaded directly into the latest eSTAR template.

The documents will comply with all three of FDA’s current cybersecurity guidance:

See below for summary descriptions of each of the documents:

Security Architecture Views

Visual diagrams of system components, data flows, connections, and trust boundaries. Includes Global System View, Multi-Patient Harm View (if applicable), Use Case Views, and Updateability View.

Cybersecurity Controls (Draft/Final)

Proposed and final security controls addressing FDA's 8 risk control categories to mitigate identified risks.

Initial draft provided in Phase 1 for software team implementation.

Cybersecurity Management Plan

Plan for managing cybersecurity risks throughout product lifecycle, including development, vulnerability handling, and monitoring.

Cybersecurity Measures and Metrics

Indicators tracking security control effectiveness (e.g., vulnerability count, patch response time).

For new devices, outlines planned metrics only.

Threat Model

STRIDE analysis of threat actors, assets, and attack vectors, showing potential vulnerabilities and safety impacts.

Security Risk Assessment

Risk evaluation showing traceability between vulnerabilities, controls, and residual risks.

Cybersecurity Labeling

User documentation covering security responsibilities, diagrams, updates, and anomaly reporting.

Software Bill of Materials (SBOM)

List of all software components and third-party libraries used in the device.

Software Level of Support and End of Support

Support duration and end-of-life plans for each SBOM component.

Vulnerability Assessment

Review of vulnerabilities found in SBOM scan.

Assessment of Unresolved Security Anomalies

Open security issues with impact analysis and mitigation plans.

Cybersecurity Testing Report

Summary of all security testing activities and results.

Penetration Testing Report

Third-party pen-test findings and recommendations with FDA-aligned analysis.

Security Risk Management Report

Final summary of all security activities providing submission-ready overview.

How much does the full-service solution cost?

It varies quite a bit based on:

  • The type of submission (IDE, 510(k), De Novo, or PMA—each increases in costs)
  • The type of device and the safety risks involved (higher risk is higher costs)
  • The state of the existing software (the more complete it is, the cheaper our service will be to complete)

A typical SaMD 510(k) is typically $40k to $70k.

How does pricing work for the guided option?

Our guided option is billed at an hourly rate, as it really depends on how much support your team requires. It typically involves a couple hours/week of Partner time ($400/hour) along with one of our trained engineers doing most of the work at a lower rate.

Will we need to make changes to our software?

Unless your medical device was designed with security in mind, it's likely that some software changes will be required. Our process is tailored to pinpoint these necessary changes swiftly so your engineers can start working on them. In some instances, we can also provide software engineering support.

Can you provide examples of past projects similar to our product?

Yes! Please review our case studies for a sampling of our past projects. If you don’t see anything relevant, please reach out as only a small number of our projects have case studies.

How does your team provide support with threat modeling?

Yes! We can work your team team to develop a threat model over a sequence of collaborative meetings. As part of threat modeling we’ll develop a set of security architecture views that comply with FDA’s expectations. We’ll guide the team through identifying external connections, assets, threat actors, and threats. Our threat modeling typically uses STRIDE combined with other threat modeling methodologies as is appropriate.

Our threat modeling approach considers the full end-to-end system, including “other functions”.

How does your team provide support with security risk management?

Yes! We can guide the Client’s team through writing an appropriate Security Risk Management Plan, including an appropriate means of assessing security risks.

We can then guide the team through a security risk assessment, using the threat modeling as an input. We’ll work with the team to trace security risks to safety risks. We’ll also help identify relevant cybersecurity controls (see the next section) and help ensure there is proper cybersecurity traceability.

Can your team help us define necessary cybersecurity controls?

Yes! We’ll work with the team to identify appropriate security risk controls against the FDA guidance. FDA typically requires at minimum one or two controls from each control category:

  • authentication
  • authorization
  • cryptography
  • integrity
  • confidentiality
  • detection
  • resiliency & recovery
  • updates.

We’ll work with you to identify the most useful controls that add the minimum necessary software development cost. We also understand what controls FDA expects for different types of devices.

Can your team help implement cybersecurity controls?

In most cases, yes, although this is at an additional cost. For most clients, it is more cost effective to have their own team implement the software controls.

How does does your team help with SBOM generation?

We can usually produce an FDA-compliant SBOM with minimal input from your engineers.

Alternatively, we can your engineers set up tools to automatically generate an SBOM as part of their automated build procedures (e.g., using a GitHub Action that produces the SBOM as a build artifact). This second approach takes longer in the short term, but is more efficient long term.

How does your team help with cybersecurity testing?

We can guide your engineering team through the cybersecurity testing process.

  • Requirements Testing: Typically handled through standard Design Controls, however, we can help draft Design Verification Protocols for verification of the Design Control requirements.
  • Vulnerability Testing: We can help select an appropriate vulnerability testing tool and incorporate it into the development workflow. This typically includes analyzing third-party packages for vulnerabilities along with static code analysis.
  • Fuzz Testing: We can help identify appropriate interfaces to fuzz test, define the scope, and can even help implement fuzz testing.
  • Penetration Testing: We can help select an appropriate pen testing vendor and can facilitate communication with the vendor to ensure they provide records that meet the FDA guidance.

We can compile all of these records into tests that are appropriate for the 510(k) submission.

How does your team help with cybersecurity labeling?

We can work with your team to draft the cybersecurity sections of the IFU based on our understanding of the device and previous submissions. This includes:

  • Instructions related to the user’s security responsibilities
  • Security diagrams
  • SBOM access
  • Software update notification
  • Security anomaly reporting and detection
  • Backup and restore functionality

Can you guarantee our submission will be cleared?

No, we can’t make such a guarantee.

FDA’s expectations are continuing to evolve. Strategies that we’ve seen work previously have stopped working in new submissions. Most teams also can’t implement everything in the guidance (and FDA doesn’t expect you to). We therefore will try to find the right amount of effort required for your device. Sometimes we will undershoot.

However, we can guarantee that you won’t pay anything extra for our support addressing any requests for additional information the FDA identifies.

Top Cybersecurity Resources

We are experts in our field. Here are a few of our most popular cybersecurity resources:


Let's Talk

Every great partnership starts with a conversation. Fill out the form below for a discovery call, and an Innolitics team member will contact you soon.